Falsification is  A.  Modular design of a software application that facilitates the integration of new  modules  B.  Showing a universal law or rule to be invalid by providing a counter example  C.  A set of attributes in a database table that refers to data in another table D.  None of these

1 Answer

Answer :

B.  Showing a universal law or rule to be invalid by providing a counter example

Related questions

Description : extendible architecture is A. Modular design of a software application that facilitates the integration of new modules B. Showing a universal law or rule to be invalid by providing a counter example C. ... of attributes in a database table that refers to data in another table D. None of these

Last Answer : A. Modular design of a software application that facilitates the integration of new modules

Description : Quantitative attributes are A. A reference to the speed of an algorithm, which is quadratically dependent on the size of the data B. Attributes of a database table that can take only numerical values C. Tools designed to query a database D. None of these

Last Answer : B. Attributes of a database table that can take only numerical values

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : The modular ratio is the ration of (a) Young’s modulus of steel to the young’s modulus of concrete (b) Young’s modules of concrete to the young’s modulus of steel (c) Load carried by steel to the load carried by concrete. (d) Load carried by concrete to the load carried by step.

Last Answer : (c) Load carried by steel to the load carried by concrete.

Description : Define Modules and modular co-ordination

Last Answer : Modules: Modules are a standard unit of size used to coordinate the dimensions of buildings and components. They are of two types: 1. Multi modules 2. Basic modules  Modular Co-ordination: The modular ... for basic module is M 1M = 100mm 100 mm = 1M = It is international standard value.

Description : The rule of Universal Instantiation (UI for short) says that we can infer any sentence obtained by substituting a ground term (a term without variables) for the variable. a) True b) False

Last Answer : a) True

Description : Which cannot be represented by a set of attributes? a) Program b) Three-dimensional configuration of a protein molecule c) Agents

Last Answer : b) Three-dimensional configuration of a protein molecule

Description : What takes input as an object described by a set of attributes? a) Tree b) Graph c) Decision graph d) Decision tree

Last Answer : d) Decision tree

Description : What takes input as an object described by a set of attributes? a) Tree b) Graph c) Decision graph d) Decision tree

Last Answer : d) Decision tree

Description : A software design is highly modular if : (A) cohesion is functional and coupling is data type. (B) cohesion is coincidental and coupling is data type. (C) cohesion is sequential and coupling is content type. (D) cohesion is functional and coupling is stamp type.

Last Answer : (A) cohesion is functional and coupling is data type.

Description : Decision trees are appropriate for the problems where ___________ a) Attributes are both numeric and nominal b) Target function takes on a discrete number of values. c) Data may have errors d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Decision trees are appropriate for the problems where: a) Attributes are both numeric and nominal b) Target function takes on a discrete number of values. c) Data may have errors d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of this is not a computer crime? A. e-mail harassment B. Falsification of data. C. Sabotage. D. Identification of data

Last Answer : D. Identification of data 

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : Consider a database table R with attributes A and B. Which of the following SQL queries is illegal ? (A) SELECT A FROM R; (B) SELECT A, COUNT(*) FROM R; (C) SELECT A, COUNT(*) FROM R GROUP BY A; (D) SELECT A, B, COUNT(*) FROM R GROUP BY A, B;

Last Answer : (B) SELECT A, COUNT(*) FROM R;

Description : Transparency A . The large set of candidate solutions possible for a problem B. The information stored in a database that can be retrieved with a single query C. Worth of the output of a machine learning program that makes it understandable for humans D . None of these

Last Answer : C. Worth of the output of a machine learning program that makes it understandable for humans

Description : Shallow knowledge A . The large set of candidate solutions possible for a problem B. The information stored in a database that can be, retrieved with a single query C. Worth of the output of a machine learning program that makes it understandable for humans D . None of these

Last Answer : B. The information stored in a database that can be, retrieved with a single query

Description : Search space A . The large set of candidate solutions possible for a problem B. The information stored in a database that can be, retrieved with a single query. C. Worth of the output of a machine learning program that makes it understandable for humans D . None of these

Last Answer : A . The large set of candidate solutions possible for a problem

Description : How much would custom software design cost on average for a simple database application that tracks information commonly found on business cards?

Last Answer : It really depends on which custom software designer you go to. However, since it is such a simple text-based project, you can expect to pay the lowest of the fees.

Description : Semi-join strategies are techniques for query processing in distributed database system. Which of the following is a semi-join technique? (A) Only the joining attributes are sent from one site to ... the attributes are sent from one site to another and then only the required rows are returned.

Last Answer : (C) Only the joining attributes are sent from one site to another and then only the required rows are returned.

Description : People overcome natural language problems by _____________ a) grouping attributes into frames b) understanding ideas in context c) identifying with familiar situations d) both understanding ideas in context & identifying with familiar situations

Last Answer : d) both understanding ideas in context & identifying with familiar situations

Description : n(log n) is referred to A. A measure of the desired maximal complexity of data mining algorithms B. A database containing volatile data used for the daily operation of an organization C. Relational database management system D. None of these

Last Answer : A. A measure of the desired maximal complexity of data mining algorithms

Description : A production rule consists of ____________ a) A set of Rule b) A sequence of steps c) Set of Rule & sequence of steps d) Arbitrary representation to problem

Last Answer : c) Set of Rule & sequence of steps

Description : Which statement best describes the Software as a Service cloud delivery model? A. A virtual machine provisioned and provided from the cloud which allows the customer to deploy custom ... and run the application on the customer's own computers and simplifying maintenance and support.

Last Answer : An application delivered to the client from the cloud which eliminates the need to install and run the application on the customer's own computers and simplifying maintenance and support.

Description : Group of attributes/field in a database is known as a: a) Data Entry b) Record c) File d) None of These

Last Answer : b) Record

Description : Identify the criteria for designing database from the point of view of user A) No redundancy B) No inapplicable attributes C) Uniformity in naming & definitions of the data items D) All of the above

Last Answer : D) All of the above

Description : Which will solve the conjuncts of the rule so that the total cost is minimized? a) Constraint variable b) Conjunct ordering c) Data complexity d) All of the mentioned

Last Answer : b) Conjunct ordering

Description : Is falsification of annulment documents a crime in Philippines?

Last Answer : Need answer

Description : Match every stage of the software Development Life cycle with the Testing Life cycle: i. Hi-level design a Unit tests ii. Code b Acceptance tests iii. Low-level design c System tests iv. Business requirements d Integration tests a) i-d , ii ... i-b , ii-a , iii-d , iv-c d) i-c , ii-a , iii-d , iv-b

Last Answer : d) i-c , ii-a , iii-d , iv-b

Description : f there are two identical products, one that has 100% accessibility and one that has 0% accessibility, a. the one with 0% accessibility will not sell at all because consumers can't find ... product with 100% accessibility will outsell the other 3 to 1 providing all other attributes are identical.

Last Answer : b. the product with 100% accessibility will outsell the other 2 to 1 providing all other attributes are identical.

Description : Which strategy would be effective when the new products have a counter cyclical sales pattern compared to an organization's present products? a. Forward integration b. Retrenchment c. Horizontal diversification d.Market diversification

Last Answer : Forward integration

Description : In object oriented design of software , objects have ? attributes and names only operations and names only attributes, name and operations None of above

Last Answer : attributes, name and operations

Description : Which of the following comments about object oriented design of software, is not true ? Objects inherit the properties of class Classes are defined based on the attributes of objects an object can belong to two classes classes are always different

Last Answer : an object can belong to two classes

Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these

Last Answer : b) Extensible Business Reporting Language

Description : Which of the following terms refers to a state of microorganisms being present within a host without causing host interference or interaction? a) Colonization Understanding the principle of colonization ... to a particular pathogen. d) Infection Infection refers to host interaction with an organism.

Last Answer : a) Colonization Understanding the principle of colonization facilitates interpretation of microbiologic reports.

Description : Name two table attributes, which are used to set spacing in and between table cells. -Technology

Last Answer : The cell spacing and cellpadding are the attributes, which are used to set spacing in and between the table cells.

Description : Lifted inference rules require finding substitutions that make different logical expressions looks identical. a) Existential Instantiation b) Universal Instantiation c) Unification d) Modus Ponen

Last Answer : c) Unification

Description : What among the following could the universal instantiation of ___________ For all x King(x) ^ Greedy(x) => Evil(x) a) King(John) ^ Greedy(John) => Evil(John) b) King(y) ^ Greedy(y) => Evil(y) c) King(Richard) ^ Greedy(Richard) => Evil(Richard) d) All of the mentioned

Last Answer : d) All of the mentioned

Description : There exist only two types of quantifiers, Universal Quantification and Existential Quantification. a) True b) False

Last Answer : a) True

Description : Which of the following is an application of NN (Neural Network)? a) Sales forecasting b) Data validation c) Risk management d) All of the mentioned

Last Answer : d) All of the mentioned

Description : Which of the following is not an application of learning? a) Data mining b) WWW c) Speech recognition d) None of the mentioned

Last Answer : d) None of the mentioned

Description : Which of the following is an application of NN (Neural Network)? a) Sales forecasting b) Data validation c) Risk management d) All of the mentioned

Last Answer : d) All of the mentioned

Description : The statement the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware refers to (A) Information ... ICT) (C) Information and Data Technology (IDT) (D) Artificial Intelligence (AI)

Last Answer : (A) Information Technology (IT)

Description : Where did all the facts are stored to implement store and fetch function? a) Database b) Knowledge base c) Datamart d) All of the mentioned

Last Answer : b) Knowledge base

Description : An expert system differs from a database program in that only an expert system _____________ a) contains declarative knowledge b) contains procedural knowledge c) features the retrieval of stored information d) expects users to draw their own conclusions

Last Answer : b) contains procedural knowledge

Description : What is the name of the computer program that contains the distilled knowledge of an expert? a) Database management system b) Management information System c) Expert system d) Artificial intelligence

Last Answer : c) Expert system

Description : Prolog is A. A programming language based on logic B. A computer where each processor has its own operating system, its own memory, and its own hard disk C. Describes the structure of the contents of a database D. None of these

Last Answer : A. A programming language based on logic

Description : Perceptron is A. General class of approaches to a problem. B. Performing several computations simultaneously C. Structures in a database those are statistically relevant D. Simple forerunner of modern neural networks, without hidden layers

Last Answer : D. Simple forerunner of modern neural networks, without hidden layers

Description : Massively parallel machine is A. A programming language based on logic B. A computer where each processor has its own operating system, its own memory, and its own hard disk C. Describes the structure of the contents of a database. D. None of these

Last Answer : B. A computer where each processor has its own operating system, its own memory, and its own hard disk

Description : What is a disjoint pattern database?

Last Answer : The sum of the two costs is still a lower bound on the cost of solving the entire problem is called a disjoint pattern database.